MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Size: px
Start display at page:

Download "MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features"

Transcription

1 MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features

2 Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security events Describe and configure User Account Control Describe the malware security features in Windows 7 Use the data security features in Windows 7 Secure Windows 7 by using Windows Update MCTS Guide to Microsoft Windows 7 2

3 Windows 7 Security Improvements Major security improvements in Windows 7 are: Malware protection Easier deployment of alternative authentication methods Enhanced network protection Data protection for stolen hard drives AppLocker for software restriction MCTS Guide to Microsoft Windows 7 3

4 Malware Protection Malware Malicious software designed to perform unauthorized acts on your computer User Account Control (UAC) Feature implemented in Windows 7 to control malware Prompts users when software attempts to take administrative control Windows Defender A real-time spyware monitor to prevent the installation of and remove spyware MCTS Guide to Microsoft Windows 7 4

5 Malware Protection (cont'd.) Spyware A threat to privacy; makes systems unstable Internet Explorer has been modified to run in a limited state (protected mode) User files cannot be modified A phishing filter has also been added Prevents unauthorized Web sites from stealing logon credentials and other personal information MCTS Guide to Microsoft Windows 7 5

6 Malware Protection (cont'd.) Windows service hardening Most Windows exploits used to install malware are the result of flaws in Windows services Windows services have been changed as follows: Each service is given a SID number Services run with a lower privilege level by default Unnecessary privileges for services have been removed Windows Firewall can control network access based on service SIDs Services are isolated and cannot interact with users MCTS Guide to Microsoft Windows 7 6

7 Alternative Authentication Methods Username and password Most common method for authentication Windows 7 makes smart cards easier to manage Development of additional authentication methods for Windows, such as biometrics, has been simplified MCTS Guide to Microsoft Windows 7 7

8 Network Protection Windows 7 is protected on networks by: Enhanced firewall Network Access Protection (NAP) Firewall can control both inbound and outbound network packets NAP prevents unhealthy computers from accessing the network An unhealthy computer is one that has outdated antivirus signatures or is missing security updates MCTS Guide to Microsoft Windows 7 8

9 Data Protection NTFS file system provides data protection by using permissions on files and folders NTFS permissions can be easily circumvented when you have physical access to a computer BitLocker Drive Encryption Encrypts the contents of a partition and protects the system partition MCTS Guide to Microsoft Windows 7 9

10 AppLocker for Software Restrictions AppLocker simplifies the management of software restrictions By implementing simpler rules than were available in software restriction policies MCTS Guide to Microsoft Windows 7 10

11 Security Policies Windows 7 includes a local security policy Can be used to control many facets of Windows Can be accessed in the Local Security Policy in Administrative Tools Local security policy categories Account policies Local policies Windows Firewall with Advanced Security Network List Manager Policies Public Key Policies MCTS Guide to Microsoft Windows 7 11

12 Security Policies (cont'd.) Local security policy categories (cont'd.) Software Restriction Policies Application Control Policies IP Security Policies on Local Computer Advanced Audit Policy Configuration The local security policy is part of a larger Windows management system called Group Policy Can be implemented on a local computer, but is typically part of a domain-based network MCTS Guide to Microsoft Windows 7 12

13 Security Policies (cont'd.) MCTS Guide to Microsoft Windows 7 13

14 Account Policies Contain the password policy and the account lockout policy Do not affect domain accounts Must be configured at the domain level Password policy Controls password characteristics for local user accounts Available settings Enforce password history Maximum password age Minimum password age MCTS Guide to Microsoft Windows 7 14

15 Account Policies (cont'd.) Password policy (cont'd.) Available settings (cont'd.) Minimum password length Password must meet complexity requirements Store passwords using reversible encryption Account lockout policy Prevents unauthorized access to Windows 7 Can configure an account to be temporarily disabled after a number of incorrect log-on attempts MCTS Guide to Microsoft Windows 7 15

16 Account Policies (cont'd.) Account lockout policy (cont'd.) Available settings Account lockout duration Account lockout threshold Reset account lockout counter after MCTS Guide to Microsoft Windows 7 16

17 Local Policies Local policies are for: Auditing system access Assigning user rights Configuring specific security options Auditing lets you track when users log on and which resources are used User rights control what system task a particular user or group of users can perform Specific security options are a variety of settings that can be used to make Windows 7 more secure MCTS Guide to Microsoft Windows 7 17

18 Local Policies (cont'd.) MCTS Guide to Microsoft Windows 7 18

19 Local Policies (cont'd.) User rights assignment settings Allow log on locally Back up files and directories Change the system time Load and unload device drivers Shut down the system Security options settings Devices Interactive logon Interactive logon Shutdown MCTS Guide to Microsoft Windows 7 19

20 AppLocker Used to define which programs are allowed or disallowed in the system Used in corporate environments where parental controls are not able to be used Enhancements over software restriction policies: Rules can be applied to specific users and groups rather than all users Default rule action is deny to increase security Wizard to help create rules. Audit only mode for testing that only writes events to the event log MCTS Guide to Microsoft Windows 7 20

21 AppLocker (cont'd.) MCTS Guide to Microsoft Windows 7 21

22 AppLocker (cont'd.) You can audit or enforce AppLocker rules Relies on the configuration of appropriate rules and the Application Identity service Rule Collections Executable Windows Installer Scripts DLL MCTS Guide to Microsoft Windows 7 22

23 AppLocker (cont'd.) MCTS Guide to Microsoft Windows 7 23

24 AppLocker (cont'd.) Rule Permissions Each rule contains permissions that define whether the rule allows or denies software the ability to run Rule Conditions Define the software that is affected by the rule Three conditions that can be used: Publisher Path File hash MCTS Guide to Microsoft Windows 7 24

25 AppLocker (cont'd.) MCTS Guide to Microsoft Windows 7 25

26 AppLocker (cont'd.) Rule Exceptions Define software that the rule does not apply to MCTS Guide to Microsoft Windows 7 26

27 Other Security Policies Windows Firewall with Advanced Security Used to configure the new firewall in Windows 7 Lets you configure both inbound and outbound rules Can be used to configure IP Security (IPsec) rules Network List Manager Policies control how Windows 7 categorizes networks Public Key Policies has a single setting for the Encrypting File System (EFS) IP Security Policies on Local Computer are used to control encrypted network communication MCTS Guide to Microsoft Windows 7 27

28 Security Templates Security templates are.inf files that contain: Settings that correspond with the Account Policies and Local Policies in the local security policy Settings for the event log, restricted groups, service configuration, registry security, and file system security Edited by using the Security Templates snap-in Security templates are used by Security Configuration and Analysis tool and Secedit MCTS Guide to Microsoft Windows 7 28

29 Security Templates (cont'd.) MCTS Guide to Microsoft Windows 7 29

30 Security Templates (cont'd.) Tasks you can perform with the Security Configuration and Analysis tool Analyze Configure Export MCTS Guide to Microsoft Windows 7 30

31 Auditing Auditing Security process that records the occurrence of specific operating system events in the Security log Every object in Windows 7 has audit events related to it Auditing is enabled through the local security policy or by using Group Policy Once the audit policy is configured The audited events are recorded in the Security log that is viewed by using Event Viewer MCTS Guide to Microsoft Windows 7 31

32 Auditing (cont'd.) MCTS Guide to Microsoft Windows 7 32

33 MCTS Guide to Microsoft Windows 7 33

34 Auditing (cont'd.) MCTS Guide to Microsoft Windows 7 34

35 User Account Control User Account Control (UAC) Feature introduced in Windows Vista that makes running applications more secure Security is enhanced by reducing the need to log on and run applications using administrator privileges When UAC is enabled and an administrative user logs on Administrative user is assigned two access tokens Standard user privileges Administrative privileges MCTS Guide to Microsoft Windows 7 35

36 User Account Control (cont'd.) Standard user access token is used to launch the Windows 7 user interface Admin Approval Mode Ensures that the access token with administrative privileges is used only when required Application Information Service Responsible for launching programs by using the access token with administrative privileges MCTS Guide to Microsoft Windows 7 36

37 Application Manifest Application manifest Describes the structure of an application Includes required DLL files and whether they are shared Applications that are not designed for Windows 7 and which require administrative privileges Do not properly request elevated privileges Fix it by using the Application Compatibility Toolkit MCTS Guide to Microsoft Windows 7 37

38 UAC Configuration Windows 7 introduces a simplified interface for managing UAC UAC is configured by using either: Windows 7 Local Security Policy For small environments Group Policy For larger environments MCTS Guide to Microsoft Windows 7 38

39 UAC Configuration (cont d.) MCTS Guide to Microsoft Windows 7 39

40 MCTS Guide to Microsoft Windows 7 40

41 Malware Protection Windows 7 includes the following features to protect computers from malware: Windows Defender Microsoft Security Essentials MCTS Guide to Microsoft Windows 7 41

42 Windows Defender Windows Defender Antispyware software included with Windows 7 Spyware Software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior Windows Defender provides two levels of protection: On-demand scanning Real-time scanning Scanning use signatures to identify spyware MCTS Guide to Microsoft Windows 7 42

43 Windows Defender (cont'd.) MCTS Guide to Microsoft Windows 7 43

44 Windows Defender (cont'd.) On-Demand Scanning Windows Defender can perform ad hoc scanning When you suspect that spyware is present on your computer Windows Defender can also perform scheduled scans Real-Time Scanning Constantly monitors your computer and alerts you when spyware attempts to install Better than on-demand scanning because you are preventing the problem rather than fixing it MCTS Guide to Microsoft Windows 7 44

45 Windows Defender (cont'd.) Real-Time Scanning (cont'd.) Protects the following areas: Downloaded files and attachments Programs that run on my computer Windows Defender Alert Levels Severe or High Medium Low MCTS Guide to Microsoft Windows 7 45

46 Windows Defender (cont'd.) Windows Defender Actions When malware is detected, it can be quarantined, removed, or allowed You can define default actions that are applied for severe, high, medium, and low alerts MCTS Guide to Microsoft Windows 7 46

47 Microsoft Security Essentials Viruses are a different type of software than spyware Some of the things viruses can do: Send spam from your computer to the internet Capture usernames and passwords for Web sites, including online banking Steal enough personal information for identity theft Allow others to remote control your computer and use it as a launching point for illegal activities Windows 7 does not include any software to protect your computer from viruses MCTS Guide to Microsoft Windows 7 47

48 Data Security NTFS permissions Most basic level of data security in Windows 7 Stop logged-on users from accessing files and folders that they are not assigned read or write permission to Relatively easy to work around NTFS permissions When you have physical access to the computer To secure data on desktop computers and laptops, encryption is required Windows 7 includes Encrypting File System (EFS) and BitLocker Drive Encryption MCTS Guide to Microsoft Windows 7 48

49 Encryption Algorithms Encryption makes data unreadable Decryption makes data readable again Symmetric encryption Same key to encrypt data and decrypt data The key is a long number that is very hard to guess Symmetric encryption is strong and fast Good for encrypting large volumes of data such as files Used by both EFS and BitLocker Drive Encryption Biggest problem is securing the key MCTS Guide to Microsoft Windows 7 49

50 Encryption Algorithms (cont'd.) MCTS Guide to Microsoft Windows 7 50

51 Encryption Algorithms (cont'd.) Asymmetric encryption Uses two keys to encrypt and decrypt data Data encrypted by one key is decrypted by the other Keys are part of a digital certificate Digital certificates are obtained from certificate authorities Requires more processing power and is less secure than symmetric encryption Use symmetric encryption to encrypt the data and then use asymmetric encryption to protect just the symmetric key MCTS Guide to Microsoft Windows 7 51

52 Encryption Algorithms (cont'd.) MCTS Guide to Microsoft Windows 7 52

53 Encryption Algorithms (cont'd.) Hash encryption One-way encryption It encrypts data, but the data cannot be decrypted Used to uniquely identify data rather than prevent access to data Sometimes hash values for data are called fingerprints Used for storing passwords When passwords are stored as only a hash value, it is impossible to decrypt the password MCTS Guide to Microsoft Windows 7 53

54 Encryption Algorithms (cont'd.) MCTS Guide to Microsoft Windows 7 54

55 Encrypting File System Encrypting File System (EFS) First included with Windows 2000 Professional Encrypts individual files and folders on a partition Suitable for protecting data files and folders on workstations and laptops Can also be used to encrypt files and folders on network servers File or folder must be located on an NTFSformatted partition MCTS Guide to Microsoft Windows 7 55

56 Encrypting File System (cont'd.) MCTS Guide to Microsoft Windows 7 56

57 Encrypting File System (cont'd.) To use EFS, users must have a digital certificate with a public key and a private key Windows 7 can generate one for you From the user perspective, encryption is a file attribute Files can also be encrypted using the commandline utility Cipher Lost encryption keys If a user loses the EFS key, then an encrypted file is unrecoverable with the default configuration MCTS Guide to Microsoft Windows 7 57

58 Encrypting File System (cont'd.) MCTS Guide to Microsoft Windows 7 58

59 Encrypting File System (cont'd.) Lost encryption keys Some ways EFS keys may be lost The user profile is corrupted The user profile is deleted accidentally The user is deleted from the system The user password is reset In User Accounts, there is an option to manage file encryption certificates Allows you to view, create, and back up certificates Creating a recovery certificate allows the files encrypted by all users to be recovered if required MCTS Guide to Microsoft Windows 7 59

60 Encrypting File System (cont'd.) Lost encryption keys (cont'd.) Steps for creating and using a recovery certificate Create the recovery certificate Install the recovery certificate Update existing encrypted files Sharing Encrypted Files Steps to work with encrypted files on multiple computers Encrypt the file on the first computer Export the EFS certificate, including the private key from the first computer MCTS Guide to Microsoft Windows 7 60

61 Encrypting File System (cont'd.) Sharing Encrypted Files (cont'd.) Steps to work with encrypted files on multiple computers (cont'd.) Import the EFS certificate, including the private key on the second computer Open the encrypted file on the second computer Steps to share encrypted files with other users Export the EFS certificate of the first user, but do not include the private key Import the EFS certificate of the first user into the profile of the second user as a trusted person Second user encrypts file and shares it with first user MCTS Guide to Microsoft Windows 7 61

62 Encrypting File System (cont'd.) Moving and Copying Encrypted Files Encrypted files behave differently when copied or moved Rules for moving and copying encrypted files An unencrypted file copied or moved to an encrypted folder becomes encrypted An encrypted file copied or moved to an unencrypted folder remains encrypted An encrypted file copied or moved to a FAT partition, FAT32 partition, or floppy disk becomes unencrypted If you have access to decrypt the file MCTS Guide to Microsoft Windows 7 62

63 Encrypting File System (cont'd.) Moving and Copying Encrypted Files (cont'd.) Rules for moving and copying encrypted files (cont'd.) If you do not have access to decrypt a file, then you get an access-denied error If you attempt to copy or move the file to a FAT partition, FAT32 partition, or floppy disk MCTS Guide to Microsoft Windows 7 63

64 BitLocker Drive Encryption BitLocker Drive Encryption Data encryption feature included with Windows 7 An entire volume is encrypted when you use BitLocker Drive Encryption Also protects the operating system Designed to be used with a Trusted Platform Module (TPM) Part of the motherboard in your computer and used to store encryption keys and certificates MCTS Guide to Microsoft Windows 7 64

65 BitLocker Drive Encryption (cont'd.) MCTS Guide to Microsoft Windows 7 65

66 BitLocker Drive Encryption (cont'd.) BitLocker Drive Encryption modes TPM only Startup key BitLocker Hard Drive Configuration Hard drive must be divided into two partitions Encrypted partition: the operating system volume Unencrypted system partition: contains necessary files to boot the operating system MCTS Guide to Microsoft Windows 7 66

67 BitLocker Drive Encryption (cont'd.) BitLocker Encryption Keys Volume Master Key (VMK) Encrypt data on the operating system volume Full Volume Encryption Key (FVEK) Used to encrypt the VMK Recovering BitLocker-Encrypted Data A recovery password is generated automatically You can save it to a USB drive or folder, display on the screen, or print MCTS Guide to Microsoft Windows 7 67

68 BitLocker Drive Encryption (cont'd.) MCTS Guide to Microsoft Windows 7 68

69 BitLocker Drive Encryption (cont'd.) Recovering BitLocker-Encrypted Data (cont'd.) Recovery password is required when the normal decryption process is unable to function Most common reasons include: Modified boot files Lost encryption keys Lost or forgotten startup PIN Disabling BitLocker Drive Encryption Decrypts all of the data on the hard drive and makes it readable again MCTS Guide to Microsoft Windows 7 69

70 BitLocker Drive Encryption (cont'd.) BitLocker To Go Included with Windows 7 Protects data on removable storage such as USB drives Options for unlocking removable storage: Use a password to unlock the drive Use my smart card to unlock the drive MCTS Guide to Microsoft Windows 7 70

71 Windows Update Scheduling automatic updates with Windows Update The most important security precaution you can take with Windows 7 When a Windows security flaw is found, the flaw is reported to Microsoft Microsoft releases a patch to fix the problem Windows Update categories Important Recommended Optional MCTS Guide to Microsoft Windows 7 71

72 Windows Update (cont'd.) MCTS Guide to Microsoft Windows 7 72

73 Windows Update (cont'd.) Windows Update settings Install updates automatically (recommended) Download updates but let me choose whether to install them Check for updates but let me choose whether to download and install them Never check for updates (not recommended) Microsoft Update is an alternative to Windows Update MCTS Guide to Microsoft Windows 7 73

74 Windows Update (cont'd.) MCTS Guide to Microsoft Windows 7 74

75 Windows Update (cont'd.) Windows Update process can be modified to use Windows Server Update Services (WSUS) WSUS allows corporations to test patches before releasing them MCTS Guide to Microsoft Windows 7 75

76 Action Center Action Center Control Panel applet that lets you quickly check important security settings in Windows 7 Settings monitored by Windows Security Network Firewall Windows Update Virus protection Spyware and unwanted software protection Internet security settings User Account Control Network Access Protection MCTS Guide to Microsoft Windows 7 76

77 Windows Security Center (cont'd.) MCTS Guide to Microsoft Windows 7 77

78 Summary Windows 7 has new improved security features Windows 7 supports various security policies including local security and account policies Security templates can be used to configure or analyze Windows 7 security options Analyzing and applying security templates is done with Secedit or the Security Configuration and Analysis MMC snap-in Auditing is used to record specific operating system events to the security log MCTS Guide to Microsoft Windows 7 78

79 Summary (cont'd.) UAC increases security by allowing users to log on and perform their jobs with standard user accounts Windows Defender is antispyware software Microsoft Security Essentials is free antivirus software EFS protects individual files by encrypting them BitLocker Drive Encryption encrypts an entire partition Windows Update ensures that patches are applied to Windows 7 as they are made available MCTS Guide to Microsoft Windows 7 79

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org Windows 7 Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse

More information

DriveLock and Windows 8

DriveLock and Windows 8 Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

ICT Professional Optional Programmes

ICT Professional Optional Programmes ICT Professional Optional Programmes Skills Team are a Microsoft Academy with new training rooms and IT labs in our purpose built training centre in Ealing, West London. We offer a range of year-long qualifications

More information

"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary

Charting the Course... ... to Your Success! MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test

More information

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

More information

70-685: Enterprise Desktop Support Technician

70-685: Enterprise Desktop Support Technician 70-685: Enterprise Desktop Support Technician Course Introduction Course Introduction Chapter 01 - Identifying Cause and Resolving Desktop Application Issues Identifying Cause and Resolving Desktop Application

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Windows 7, Enterprise Desktop Support Technician Course Number: 70-685 Certification Exam This course is preparation for the Microsoft Certified IT Professional (MCITP) Exam, Exam 70-685: Pro: Windows

More information

T21: Microsoft Windows Server and Client Security Donald E. Hester, Maze Associates

T21: Microsoft Windows Server and Client Security Donald E. Hester, Maze Associates T21: Microsoft Windows Server and Client Security Donald E. Hester, Maze Associates Microsoft Windows Server and Client Security Windows 7, Vista and Server 2008 R2 Donald E. Hester CISSP, CISA, CAP, MCT,

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. www.uscyberpatriot.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. www.uscyberpatriot. AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION

More information

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed. CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day

More information

Windows Server 2008/2012 Server Hardening

Windows Server 2008/2012 Server Hardening Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible

More information

Practice test 220-802 Domain-2 Security (Brought to you by RMRoberts.com)

Practice test 220-802 Domain-2 Security (Brought to you by RMRoberts.com) Practice test 220-802 Domain-2 Security (Brought to you by RMRoberts.com) 1. Which command is used to access the local group policy editor for Windows 7? A. poledit.exe B. gpedit.msc C. local.msc D. grplocal.exe

More information

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12 Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge

More information

Windows 7 Security Overview

Windows 7 Security Overview Windows 7 Security: To Protect and Serve Matthew Hartel Application Analyst White and Williams LLP hartelm@whiteandwilliams.com Tel: 215-864-7485 J. Abernethy Practice Manager Legal Applications mindshift

More information

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide BitLocker Deployment Guide Document Version 0.0.0.5 http://www.wave.com ERAS v 2.8 Wave Systems Corp. 2010 Contents Contents... 2

More information

MS-50292 - MCITP: Windows 7 Enterprise Desktop Support Technician Boot Camp

MS-50292 - MCITP: Windows 7 Enterprise Desktop Support Technician Boot Camp MS-50292 - MCITP: Windows 7 Enterprise Desktop Support Technician Boot Camp Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

Keeping Windows 8.1 safe and secure

Keeping Windows 8.1 safe and secure Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Security Overview for Windows Vista Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Agenda User and group changes Encryption changes Audit changes User rights New and modified

More information

Managing and Maintaining a Microsoft Windows Server 2003 Environment

Managing and Maintaining a Microsoft Windows Server 2003 Environment Managing and Maintaining a Microsoft Windows Server 2003 Environment Course 2273: Five days; Blended (classroom/e-learning) Introduction Elements of this syllabus are subject to change. This course combines

More information

Chapter 4 Application, Data and Host Security

Chapter 4 Application, Data and Host Security Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

Activity 1: Scanning with Windows Defender

Activity 1: Scanning with Windows Defender Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1 4. Choose Scan selected drives and folders

More information

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015 Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is

More information

Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation robnotto@microsoft.com

Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation robnotto@microsoft.com Security and Compliance Robert Nottoli Principal Technology Specialist Microsoft Corporation robnotto@microsoft.com DISCLAIMER FOR DOCUMENTATION REGARDING PRE-RELEASED SOFTWARE This document supports a

More information

Configuring Windows Server 2008 Active Directory

Configuring Windows Server 2008 Active Directory Configuring Windows Server 2008 Active Directory Course Number: 70-680 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-680: TS: Windows 7, Configuring

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing

MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing MCTS Guide to Microsoft Windows 7 Chapter 13 Enterprise Computing Objectives Understand Active Directory Use Group Policy to control Windows 7 Control device installation with Group Policy settings Plan

More information

Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc.

Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc. Microsoft Windows 7 Administration Instant Reference William Panek WILEY Wiley Publishing, Inc. Introduction xix PART I: Installation 1 Chapter 1: Installing Windows 7 3 Understand Windows 7's New Features

More information

Installing and Configuring Windows 10 20697-1; 5 Days; Instructor-led

Installing and Configuring Windows 10 20697-1; 5 Days; Instructor-led Installing and Configuring Windows 10 20697-1; 5 Days; Instructor-led Course Description This course is designed to provide students with the knowledge and skills required to install and configure Windows

More information

Operating System Security

Operating System Security Operating System Security Klaus Schütz Windows OS Security Microsoft Redmond Before I start My VP love(d) me A frustrated friend 1 Agenda Evolution of Threats Client vs. Server Security Operating System

More information

Security. TestOut Modules 12.6 12.10

Security. TestOut Modules 12.6 12.10 Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Installing and Configuring Windows 10 20697-1B; 5 Days, Instructor-led

Installing and Configuring Windows 10 20697-1B; 5 Days, Instructor-led Installing and Configuring Windows 10 20697-1B; 5 Days, Instructor-led Course Description This course is designed to provide students with the knowledge and skills required to install and configure Windows

More information

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2 Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.

More information

Training Guide: Configuring Windows8 8

Training Guide: Configuring Windows8 8 Training Guide: Configuring Windows8 8 Scott D. Lowe Derek Schauland Rick W. Vanover Introduction System requirements Practice setup instructions Acknowledgments Errata & book support We want to hear from

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Managing Applications, Services, Folders, and Libraries

Managing Applications, Services, Folders, and Libraries Lesson 4 Managing Applications, Services, Folders, and Libraries Learning Objectives Students will learn to: Understand Local versus Network Applications Remove or Uninstall an Application Understand Group

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

Introducing Windows 8

Introducing Windows 8 Introducing Windows 8 Introduction Very Aggressive Change Building block for the future and future of devices Biggest Obstacle: Where is!?!? The New User Experience Start Screen Full screen Start Menu

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The

More information

Setting Up, Managing, and Troubleshooting Security Accounts and Policies

Setting Up, Managing, and Troubleshooting Security Accounts and Policies 3 Setting Up, Managing, and Troubleshooting Security Accounts and Policies............................................... Terms you ll need to understand: Local user account Local group Complex password

More information

Installing and Configuring Windows 10 MOC 20967-1

Installing and Configuring Windows 10 MOC 20967-1 Installing and Configuring Windows 10 MOC 20967-1 Course Length: 5 Days Course Delivery: Traditional Classroom Online Live On Demand Overview This course is designed to provide students with the knowledge

More information

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב עש ספיר מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.

More information

Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana 46240 USA

Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana 46240 USA Paul McFedries Microsoft Windows9 Home Server 2011 LEASHE Third Edition 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents Introduction 1 Part I Unleashing Windows Home Server Configuration

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft

More information

Configuring Windows 8.1

Configuring Windows 8.1 Course 20687D: Configuring Windows 8.1 Course Details Course Outline Module 1: Windows 8.1 in an Enterprise Environment Windows client operating systems are essential to the functionality of almost every

More information

Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led

Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led Course Description This five-day instructor-led course provides students with the knowledge and skills to successfully administer,

More information

11 NETWORK SECURITY PROJECTS. Project 11.1. Understanding Key Concepts. Project 11.2. Using Auditing and Event Logs. Project 11.3

11 NETWORK SECURITY PROJECTS. Project 11.1. Understanding Key Concepts. Project 11.2. Using Auditing and Event Logs. Project 11.3 11 NETWORK SECURITY PROJECTS Project 11.1 Project 11.2 Project 11.3 Project 11.4 Project 11.5 Understanding Key Concepts Using Auditing and Event Logs Managing Account Lockout Policies Managing Password

More information

Objectif. Participant. Prérequis. Remarque. Programme. Windows 7, Enterprise Desktop Support Technician (seven)

Objectif. Participant. Prérequis. Remarque. Programme. Windows 7, Enterprise Desktop Support Technician (seven) Objectif This five-day instructor-ledcourse provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help

More information

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Chapter 15: Computer and Network Security

Chapter 15: Computer and Network Security Chapter 15: Computer and Network Security Complete CompTIA A+ Guide to PCs, 6e What is in a security policy Mobile device security methods and devices To perform operating system and data protection How

More information

Administering Windows 7 for the Enterprise Desktop Support Technician

Administering Windows 7 for the Enterprise Desktop Support Technician 50292 - Administering Windows 7 for the Enterprise Desktop Support Technician Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description Course Overview This five-day instructor-led

More information

Implementing HIPAA Compliance with ScriptLogic

Implementing HIPAA Compliance with ScriptLogic Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

Course Outline. ttttttt

Course Outline. ttttttt 1300 86 87246 1300 TO TRAIN 50292 - Administering and Maintaining General Description This five-day instructor-led course provides students with the knowledge and skills to successfully administer, maintain,

More information

Managing and Supporting Windows XP Chapter #16

Managing and Supporting Windows XP Chapter #16 Managing and Supporting Windows XP Chapter #16 Amy Hissom Key Terms Backup Operator A Windows 2000/XP user account that can back up and restore any files on the system regardless of its having access to

More information

usrig noows microsoft cue* J. Peter Bruzzese Nick Saccomanno 800 East 96th Street, Indianapolis, Indiana 46240 USA

usrig noows microsoft cue* J. Peter Bruzzese Nick Saccomanno 800 East 96th Street, Indianapolis, Indiana 46240 USA usrig microsoft noows J. Peter Bruzzese Nick Saccomanno cue* 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents v Table of Contents 1 Navigating Your Windows 7 Environment 5 The Windows

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician MS50331 Längd: 5 dagar Windows 7, Enterprise Desktop Support Technician Detta är den bredaste, mest djuplodande kursen för dig som arbetar som Supporttekniker och behöver vara champion på Windows när frågorna

More information

MS 20687 Configuring Windows 8.1

MS 20687 Configuring Windows 8.1 P a g e 1 of 12 MS 20687 Configuring Windows 8.1 About this Course Get expert instruction and hands-on practice administering and configuring Windows 8.1 in this 5-day Microsoft Official Course. This course

More information

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients

More information

Microsoft Corporation. Status: Preliminary documentation

Microsoft Corporation. Status: Preliminary documentation Microsoft Corporation Status: Preliminary documentation Beta content: This guide is currently in beta form. The AppLocker team greatly appreciates you reviewing the document and looks forward to receiving

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure

Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 1 Walton Centre Access and Authentication (network) Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 2 Table of Contents Section

More information

Web. Security Options Comparison

Web. Security Options Comparison Web 3 Security Options Comparison Windows Server 2003 provides a number of Security Options that can be applied within the scope of managing a GPO. Most are the same as those available in Windows 2000.

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

MS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.

MS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery. MS-50292: Administering and Maintaining Windows 7 This five-day instructor-led course provides students with the knowledge and skills to successfully install, maintain, and troubleshoot Windows 7 computers.

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

Course 20688A: Managing and Maintaining Windows 8

Course 20688A: Managing and Maintaining Windows 8 Course 20688A: Managing and Maintaining Windows 8 Length: 5 Days Audience(s): IT Professionals Level: 200 Delivery Method: Instructor-led (classroom) About this Course In this course, students learn how

More information

Administering Windows Server 2012

Administering Windows Server 2012 Administering Windows Server 2012 Course Summary Configuring and Troubleshooting Domain Name System Maintaining Active Directory Domain Services Managing User and Service Accounts Implementing a Group

More information

Managing Remote Access

Managing Remote Access VMWARE TECHNICAL NOTE VMware ACE Managing Remote Access This technical note explains how to use VMware ACE to manage remote access through VPN to a corporate network. This document contains the following

More information

Disk Encryption. Aaron Howard IT Security Office

Disk Encryption. Aaron Howard IT Security Office Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance

More information

Default Domain Policy Data collected on: 10/12/2012 5:28:08 PM General

Default Domain Policy Data collected on: 10/12/2012 5:28:08 PM General Default Domain Default Domain Data collected on: 10/12/2012 5:28:08 PM General Details Domain Owner Created Modified User Revisions Computer Revisions Unique ID GPO Status webrecon.local WEBRECON\Domain

More information

Windows" 7 Desktop Support

Windows 7 Desktop Support Windows" 7 Desktop Support and Administration Real World Skills for MCITP Certification and Beyond Darril Gibson WILEY Wiley Publishing, Inc. Contents Introduction xxiii Chapter 1 Planning for the Installation

More information

Course 6292A: Installing and Configuring Windows 7 Client. About this Course. Audience Profile

Course 6292A: Installing and Configuring Windows 7 Client. About this Course. Audience Profile Course 6292A: Installing and Configuring Windows 7 Client Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 200 Technology: Windows 7 Type: Course Delivery Method: Instructor-led

More information

ADM:49 DPS POLICY MANUAL Page 1 of 5

ADM:49 DPS POLICY MANUAL Page 1 of 5 DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

MBAM Self-Help Portals

MBAM Self-Help Portals MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa

More information

On-Site Computer Solutions values these technologies as part of an overall security plan:

On-Site Computer Solutions values these technologies as part of an overall security plan: Network Security Best Practices On-Site Computer Solutions Brian McMurtry Version 1.2 Revised June 23, 2008 In a business world where data privacy, integrity, and security are paramount, the small and

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

Maintaining a Microsoft Windows Server 2003 Environment

Maintaining a Microsoft Windows Server 2003 Environment Maintaining a Microsoft Windows Server 2003 Environment Course number: 2275C Course lenght: 3 days Course Outline Module 1: Preparing to Administer a Server This module explains how to administer a server.

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Configuring and Administering Windows 7

Configuring and Administering Windows 7 Configuring and Administering Windows 7 Length: 5 days Overview This five-day instructor-led course provides students with the knowledge and skills to configure and administer Microsoft Windows 7 as a

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

How to enable Disk Encryption on a laptop

How to enable Disk Encryption on a laptop How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data

More information

Encrypting with BitLocker for disk volumes under Windows 7

Encrypting with BitLocker for disk volumes under Windows 7 Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Advanced Diploma In Hardware, Networking & Server Configuration

Advanced Diploma In Hardware, Networking & Server Configuration Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking

More information